• Acta Optica Sinica
  • Vol. 35, Issue 2, 209002 (2015)
Liu Zhen*, Bai Taotao, and Lu Peng
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3788/aos201535.0209002 Cite this Article Set citation alerts
    Liu Zhen, Bai Taotao, Lu Peng. Encrypted Holographic Watermarking Technology with Decrypted Image Superposed No Noise[J]. Acta Optica Sinica, 2015, 35(2): 209002 Copy Citation Text show less
    References

    [1] Bai Taotao, Liu Zhen, Lu Peng. Digital watermarking scheme in Contourlet domain based on QR code [J]. Journal of Optoelectronics·Laser, 2014, 25(4): 769-776.

    [2] M Urvoy, D Goudia, F Autrusseau. Perceptual DFT watermarking with improved detection and robustness to geometrical distortions [J]. IEEE Transactions on Information Forensics and Security, 2014, 9(7): 1108-1119.

    [3] E D Tsougenis, G A Papakostas, D E Koulouriotis, et al.. Adaptive color image watermarking by the use of quaternion image moments [J]. Expert Systems with Applications, 2014, 41(14): 6408-6418.

    [4] A Keskinarkaus, A Pramila, T Seppanen. Image watermarking with feature point based synchronization robust to print–scan attack [J]. Journal of Visual Communication and Image Representation, 2012, 23(3): 507-515.

    [5] Ye Tianyu. A watermarking algorithm for print forgery prevention based on comparison between norm and mean of norm [J]. Opto-Electronic Engineering, 2011, 38(6): 126-133.

    [6] N Takai, Y Mifune. Digital watermarking by a holographic technique [J]. Appl Opt, 2002, 41(5): 865-873.

    [7] Shi Xiaoyan, Zhao Daomu. Image hiding in Fourier domain by use of joint transform correlator architecture and holographic technique [J]. Appl Opt, 2011, 50(5): 766-772.

    [8] C Martinez, O Lemonnier, F Laulagnet, et al.. Complementary computer generated holography for aesthetic watermarking [J]. Opt Express, 2012, 20(5): 5547-5556.

    [9] Li Jianzhong. An optimized watermarking scheme using an encrypted gyrator transform computer generated hologram based on particle swarm optimization [J]. Opt Express, 2014, 22(8): 10002-10016.

    [10] Sun Liujie, Zhuang Songlin. Watermarking by encrypted Fourier holography [J]. Opt Eng, 2007, 46(8): 085801.

    [11] Sun Liujie, Zhuang Songlin. Forgery prevention based on inline Fourier holographic watermark with double random phase encryption [J]. Acta Optica Sinica, 2007, 27(4): 621-624.

    [12] Sun Yunfeng, Zhai Hongchen, Yang Xiaoping, et al.. Application of Fourier CGH digital watermarking technique in color image forgery-prevention printing [J]. Journal of Optoelectronics·Laser, 2008, 19(7): 952-955.

    [13] Huang Sujuan, Wang Shuozhong, Yu Yingjie. Computer generated holography based on Fourier transform using conjugate symmetric extension [J]. Acta Physica Sinica, 2009, 58(2): 952-958.

    [14] Huang Sujuan, Wang Duyao, Liu Xiaojing, et al.. Hardcopy hologram watermarking based on discrete wavelet transform [J]. Journal of Optoelectronics·Laser, 2011, 22(9): 1415-1420.

    [15] Chen Daqing, Zhou Hao, Tao Zhi, et al.. Fourier computer-generated hologram digital watermarking with nonlinear amplitude limiting [J]. Acta Optica Sinica, 2011, 31(2): 0207002.

    [16] Chen Jiazhen, Zheng Zihua, Lian Guiren, et al.. Computer-generated holographic watermark technology based on four detour phases encoding scheme [J]. Laser & Optoelectronics Progress, 2010, 47(6): 060901.

    [17] Chen Jiazhen, Zheng Zihua, Lian Guiren, et al.. Nonuniform quantization digital holography and its application in information hiding [J]. Laser & Optoelectronics Progress, 2010, 47(12): 120901.

    CLP Journals

    [1] Wu Weimin, Chen Jiazhen. Multiple Watermarking Method Based on Double Random Phase Encryption System with Double Quick Response Code[J]. Laser & Optoelectronics Progress, 2017, 54(12): 120901

    [2] Lin Chao, Shen Xueju, Lei Ming, Dou Shuaifeng, Zou Xiao. Optical Security Validation Based on Orthogonal Polarization Multiplexing in Three-Dimensional Space[J]. Acta Optica Sinica, 2016, 36(3): 307001

    Liu Zhen, Bai Taotao, Lu Peng. Encrypted Holographic Watermarking Technology with Decrypted Image Superposed No Noise[J]. Acta Optica Sinica, 2015, 35(2): 209002
    Download Citation